Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
We describe a new framework for building a system that consists of tools and services for supporting Cyberinfrastructure based scientific research. This system, called the Semanti...
Geoffrey Fox, Ahmet Fatih Mustacoglu, Ahmet E. Top...
In this poster, we present Oyster, a Peer-to-Peer system for exchanging ontology metadata among communities in the Semantic Web. Oyster exploits semantic web techniques in data re...
The paper uses a case example to present a novel way of building enterprise information systems. The objective is to bring forth the benefits of an item centric systems design in ...
An increasing number of social networking platforms are giving users the option to endorse entities that they find appealing, such as videos, photos, or even other users. We defin...